• Michael Paquier's avatar
    Fix buffer overflow when processing SCRAM final message in libpq · b6742117
    Michael Paquier authored
    When a client connects to a rogue server sending specifically-crafted
    messages, this can suffice to execute arbitrary code as the operating
    system account used by the client.
    
    While on it, fix one error handling when decoding an incorrect salt
    included in the first message received from server.
    
    Author: Michael Paquier
    Reviewed-by: Jonathan Katz, Heikki Linnakangas
    Security: CVE-2019-10164
    Backpatch-through: 10
    b6742117
fe-auth-scram.c 19.4 KB